Cisco Identity Services Engine Administrator Guide, Release 1.4.1 First Published: April 04, 2016 Last Modified: July 01, 2016
Total Page:16
File Type:pdf, Size:1020Kb
Cisco Identity Services Engine Administrator Guide, Release 1.4.1 First Published: April 04, 2016 Last Modified: July 01, 2016 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http:// www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) © 2016 Cisco Systems, Inc. All rights reserved. CONTENTS PART I Introduction 1 CHAPTER 1 Cisco ISE Features 3 Cisco ISE Features 4 Key Functions 4 Identity-Based Network Access 4 Support for Multiple Deployment Scenarios 5 Support for UCS Hardware 5 Basic User Authentication and Authorization 5 Policy Sets 6 FIPS 140-2 Implementation 6 Support for Common Access Card Functions 7 Client Posture Assessment 7 Network Access for Guests 8 Support for Personal Devices 8 Mobile Device Manager Interoperability with Cisco ISE 8 Wireless and VPN Traffic with Inline Posture Nodes 8 Profiled Endpoints on the Network 9 Cisco pxGrid Services 9 Cisco ISE Certificate Authority 9 Support for Active Directory Multidomain Forests 9 Support for SAnet Devices 9 Support for Installation on Multiple Hardware and VMware Platforms 10 Identity Provider as an External Identity Source 10 Support for Automatic Failover for the Administration Node 10 CHAPTER 2 Navigate the Admin portal 11 Admin Portal 12 Cisco Identity Services Engine Administrator Guide, Release 1.4.1 iii Contents Cisco ISE Dashboard 13 Setup Assistant 14 Cisco ISE Licensing Impact on Setup Assistant 14 Run the Setup Assistant 14 Setup Assistant Overwrites Previous Configurations 15 Identify Policy Requirements Page in Setup Assistant 15 Configure Network Access Service Page in Setup Assistant 16 Select Network Device Types Page in Setup Assistant 18 Review and Confirm Your Choices Page in Setup Assistant 18 Filter Data on Listing Pages 18 Data Filters in Listing Pages 19 Customize the Displayed Field Attributes 19 Filter Data by Field Attributes Using the Quick Filter 19 Filter Data by Conditions Using the Advanced Filter 20 Create Custom Filters 20 Cisco ISE Internationalization and Localization 20 Supported Languages 20 End-User Web Portal Localization 21 Support for UTF-8 Character Data Entry 22 UTF-8 Credential Authentication 22 UTF-8 Policies and Posture Assessment 22 Cisco NAC and MAC Agent UTF-8 Support 22 UTF-8 Support for Messages Sent to Supplicant 23 Reports and Alerts UTF-8 Support 23 UTF-8 Character Support in the Portals 23 UTF-8 Support Outside the User Interface 26 Support for Importing and Exporting UTF-8 Values 26 UTF-8 Support on REST 26 UTF-8 Support for Identity Stores Authorization Data 27 MAC Address Normalization 27 Admin Features Limited by Role-Based Access Control Policies 27 PART II Deploy Cisco ISE Nodes 29 CHAPTER 3 Set Up Cisco ISE in a Distributed Environment 31 Cisco Identity Services Engine Administrator Guide, Release 1.4.1 iv Contents Cisco ISE Distributed Deployment 32 Cisco ISE Deployment Terminology 32 Personas in Distributed Cisco ISE Deployments 32 Administration Node 33 High Availability in Administration Nodes 33 High-Availability Health Check Nodes 35 Health Probe by Health Check Nodes 35 Startup of Health Check Node 35 Shutdown of Health Check Node 36 Restart of Health Check Node 36 Health Check of the Primary Administration Node 36 Automatic Failover of the Secondary Administration Node 36 Sample Scenarios when Automatic Failover is Avoided 37 Fallback to the Original PAN 37 Manual Promotion of the Secondary Administration Node 37 Functionalities Affected by the PAN Auto-Failover Feature 38 Policy Service Node 39 High Availability in Policy Service Nodes 39 Load Balancer To Distribute Requests Evenly Among PSNs 40 Session Failover in Policy Service Nodes 40 Number of Nodes in a Policy Service Node Group 40 Monitoring Node 40 Automatic Failover in Monitoring Nodes 41 Cisco pxGrid Services 42 pxGrid Client and Capability Management 43 Enable pxGrid Clients 43 Cisco pxGrid Live Logs 43 ISE pxGrid Identity Mapping 43 Configure Identity Mapping 44 Filter Identity Mapping 45 Active Directory Requirements to Support Identity Mapping 46 Configure Active Directory for Identity Mapping 46 Set the Windows Audit Policy 49 Set Permissions When AD User in the Domain Admin Group 49 Required Permissions When AD User Not in Domain Admin Group 50 Cisco Identity Services Engine Administrator Guide, Release 1.4.1 v Contents Permissions to Use DCOM on the Domain Controller 52 Set Permissions for Access to WMI Root/CIMv2 Name Space 54 Grant Access to the Security Event Log on the AD Domain Controller 55 Inline Posture Node 56 Inline Posture Node Installation 57 Cisco ISE Distributed Deployment 57 Cisco ISE Deployment Setup 57 Data Replication from Primary to Secondary ISE Nodes 57 Cisco ISE Node Deregistration 58 Automatic Restart of the Cisco ISE Application Server 58 Guidelines for Setting Up a Distributed Deployment 58 Menu Options Available on Primary and Secondary Nodes 59 Configure a Cisco ISE Node 60 Configure a Primary Administration Node 61 Register a Secondary Cisco ISE Node 61 Register an Inline Posture Node 63 View Nodes in a Deployment 64 Synchronize Primary and Secondary Cisco ISE Nodes 64 Create a Policy Service Node Group 64 Deploy Cisco pxGrid Services 65 Change Node Personas and Services 66 Manually Promote Secondary Administration Node To Primary 66 Configure Primary Administration Node for Automatic Failover 67 Configure Monitoring Nodes for Automatic Failover 68 Remove a Node from Deployment 69 Change the Hostname or IP Address of a Standalone Cisco ISE Node 69 Replace the Cisco ISE Appliance Hardware 70 CHAPTER 4 Set Up Inline Posture 71 Role of Inline Posture Node in a Cisco ISE Deployment 71 Inline Posture Policy Enforcement 72 Inline Posture Policy Enforcement Flow 72 Trusted and Untrusted Interfaces 74 Dedicated Nodes Required for Inline Posture 74 Standalone Inline Posture Node in a Cisco ISE Deployment 74 Cisco Identity Services Engine Administrator Guide, Release 1.4.1 vi Contents Inline Posture High Availability 74 Automatic Failover in Inline Posture Nodes 75 Inline Posture Operating Modes 75 Inline Posture Routed Mode 76 Inline Posture Bridged Mode 76 Inline Posture Maintenance Mode 77 Inline Posture High Availability in Routed and Bridged Modes 77 Best Practices for Inline Posture Deployment 78 Inline Posture Node Guidelines 79 Inline Posture Node Authorization 82 Deploy an Inline Posture Node 84 Configure an Inline Posture Node 84 Create Inline Posture Downloadable Access Control Lists 87 Create Inline Posture Node Profiles 87 Create an Inline Posture Authorization Policy 88 Configure a High-Availability Pair 89 Synchronize an Inline Posture Node 90 Configure Inline Posture Node as RADIUS Client in Administration Node 91 Remove an Inline Posture Node from Deployment 92 Health of an Inline Posture Node 92 Remote Access VPN Use Case 92 Configure an Inline Posture Node with a VPN Device 94 Collection of Inline Posture Node Logs 94 Kclick process in Inline Posture Node 95 PART III Setup Cisco ISE Management Access 97 CHAPTER 5 Administer Cisco ISE 99 Log in to Cisco ISE 99 Administrator Login Browser Support 100 Administrator Lockout